Mobile Computing Solutions with Intel® Core™ vPro™ Processors

Intel delivers speed and security on the go 1,2

To help deliver the instant communication and access to applications today’s users need, mobile solutions based on Intel® Core™ vPro™ processors and Intel® Core™ processors extend the limits of mobile computing. No matter where business takes your remote users, Intel-powered mobile solutions keep the experience rich, secure, and productive with features that:

Protect critical business data by accelerating data encryption up to four times faster without interfering with user productivity3,4

Deliver an automatic burst of speed whenever users need it5

Wake clients in a flash, enabling them to return to full operational power within seconds and power down when on standby, saving both time and battery life6

Embedded security adds another layer of protection1,2

As the workforce becomes more mobile and users continue to mix personal and professional roles and applications, Intel® Core™ vPro™ processors have stepped up to help protect corporate infrastructure from new, more sophisticated attacks and security breaches. These embedded technologies are available in a variety of thin and light laptops, providing mobile users with a powerful combination of intelligent performance and built-in security.

Hardware-level policies: Detect suspicious behavior and cut off suspect laptops from the network

Remote support and monitoring capabilities: Enable help desk staff to access and control users’ computers to resolve issues through all states, including reboot

Manage threats: Push security updates to users before a breach occurs and diagnose, isolate, and repair infected PCs after a breach takes place8

Protect data in the cloud and on mobile PCs: Hardware-based encryption technology generates higher random numbers, making data encryption even more secure for safer online interactions3

Lock down lost or stolen laptops

With the rapid growth of mobile computing, one of the biggest risks of data loss is through a lost or stolen PC. Intelligent, hardware-based security features can limit the loss of a laptop to only the actual laptop. In other words, they help protect the contents of its missing hard drive. This is done in several ways:

The PC automatically disables itself locally if it detects a hacker, even before the user has realized it’s been lost or stolen

If the PC is discovered lost or stolen, but no attempt at hacking has been made, IT can remotely access and lock it down

A “poison pill” option can be sent via an embedded token that renders missing laptops useless—unauthorized users cannot access the hard drive10

4. Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information, go to www.intel.com/performance.